{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:13:22Z","timestamp":1743128002962,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540666950"},{"type":"electronic","value":"9783540477907"}],"license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-47790-x_9","type":"book-chapter","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T23:07:18Z","timestamp":1186614438000},"page":"85-102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Implementation of Virtual Private Networks at the Transport Layer"],"prefix":"10.1007","author":[{"given":"Jorge","family":"Davila","sequence":"first","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]},{"given":"Rene","family":"Peralta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,22]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"R. Atkinson, \u201cSecurity Architecture for the Internet Protocol\u201d, RFC??? 1825, August 1995.","DOI":"10.17487\/rfc1825"},{"key":"9_CR2","unstructured":"U. Black, \u201cFrame-Relay: Specifications and Implementations\u201d, McGraw-Hill, 1994"},{"key":"9_CR3","unstructured":"CCITT, Recommendation X.509. The Directory-Authentication Framework. Blue Book-Melbourne 1988, Fascicle VIII.8"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"T. Dierks, C. Allern, \u201cThe TLS Protocol Version 1.0.\u201d Internet Draft, November 1998","DOI":"10.17487\/rfc2246"},{"issue":"n. 6","key":"9_CR5","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie, M. Hellman, \u201cNew Directions in Cryptography\u201d. IEEE Transactions on Information Theory, IT-22, n. 6. 1976, pp. 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"9_CR6","volume-title":"Data Encryption Standard","author":"FIPS 46","year":"1977","unstructured":"FIPS 46, Data Encryption Standard, NBS, U.S. Department of Commerce, Washington D.C., January 1977"},{"key":"9_CR7","volume-title":"Security Requirements for Cryptographic Modules","author":"FIPS-140-1","year":"1994","unstructured":"FIPS-140-1, Security Requirements for Cryptographic Modules, U.S. Department of Commerce, NIST, Washington, DC, 1994."},{"key":"9_CR8","volume-title":"Secure Hash Standard","author":"FIPS 180-1","year":"1995","unstructured":"FIPS 180-1, Secure Hash Standard, NIST, U.S. Department of Commerce, Washington D.C., April 1995"},{"key":"9_CR9","unstructured":"R. Harbison, \u201cFrame-Relay: Technology for our Time\u201d, LAN Technology, December 1992"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"M. Horowitz, S. Lunt, \u201cFTP Security Extensions\u201d, RFC??? 2228, October 1997.","DOI":"10.17487\/rfc2228"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"X. Lai, J. Massey, \u201cHash Functions Based on Block Ciphers\u201d Advances in Cryptology, Proceedings EUROCRYPT\u2019 92, Springer-Verlag, 1992, pp. 55\u201370","DOI":"10.1007\/3-540-47555-9_5"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"J. Linn, \u201cPrivacy Enhancement for Internet Electronic Mail: Part I-Message Encipherment and Authentication Procedures\u201d, RFC??? 989, February 1987.","DOI":"10.17487\/rfc0989"},{"key":"9_CR13","unstructured":"Microsoft Corporation, \u201cThe Private Communication Technology\u201d, 1997. \nhttp:\/\/premium.microsoft.com\/msdn\/library\/backgrnd\/html\/msdnpct.htm"},{"key":"9_CR14","unstructured":"Netscape Communications, \u201cSSL 3.0 Specification\u201d. \nhttp:\/\/www.netscape.com\/libr\/ssl3\/index.html"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"B. Ramsdell, \u201cS\/MIME Version 3 Message Specification\u201d, Internet Draft, August 1998.","DOI":"10.17487\/rfc2633"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"R. Rivest, \u201cThe MD5 Message Digest Algorithm\u201d. RFC 1321, April 1992","DOI":"10.17487\/rfc1321"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"A. Schiffman, E. Rescorla, \u201cThe Secure Hypertext Transfer Protocol\u201d, Internet Draft, June 1998.","DOI":"10.17487\/rfc2660"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"B. Schneier, \u201cDescription of a New Variable-Lenght Key, 64-Bit Block Cipher (Blowfish)\u201d, Fast Software Encryption, Springer-Verlag, 1994, pp. 191\u2013204","DOI":"10.1007\/3-540-58108-1_24"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"T. J. Socolofsky, C. Kale, \u201cA TCP\/IP Tutorial\u201d, RFC 1180, January 1991.","DOI":"10.17487\/rfc1180"},{"key":"9_CR20","unstructured":"P.R. Zimmermann, \u201cThe Official PGP User\u2019s Guide\u201d. MIT Press, 1995."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47790-X_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T17:12:04Z","timestamp":1585933924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47790-X_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666950","9783540477907"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-47790-x_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]},"assertion":[{"value":"22 October 1999","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}